Check Point Reference: | CPAI-2013-2454 |
Date Published: | 4 Jul 2013 |
Severity: | High |
Last Updated: | Tuesday 07 January, 2025 |
Source: | CVE-2007-0774 CVE-2014-0050 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Web servers |
Vulnerability Description | It is good security practice to limit the sizes of different elements in HTTP request and response. This reduces the chance for buffer overruns and limits the size of code that can be inserted into the header. |
Vulnerability Details | This protection allows you to configure upper bounds to different elements in the HTTP request and response. You can also impose limits on specific headers using a regular expression to describe the header name. If the inspected HTTP connection contains more than one request, the limits are imposed on each request separately. |
This protection can be applied either to all traffic or to specific web servers. When the attack is blocked, users can be informed via a customizable web page.
SmartView Tracker will log the following entries:
Attack Name: HTTP Protocol Inspection
Attack Information: HTTP Format Sizes